School of Computer and Information Science, Edith Cowan University, Perth, Western Australia

Comments

Originally published in the Proceedings of 5th Australian Information Security Management Conference, Edith Cowan University, Perth Western Australia, December 4th 2007

Abstract

Information superiority has been defined as a state that is achieved when a competitive advantage is derived from the ability to exploit a superior information position. To achieve such a superior information position enterprises and nations, alike, must not only collect and record correct, accurate, timely and useful information but also ensure that information recorded is not lost to competitors due to lack of comprehensive security and leaks. Further, enterprises that aim to attain information superiority must also ensure mechanisms of validating and verifying information to reduce the chances of mis-information. Although, research has been carried out into ways to increase the security of information and detect leaks, not enough focus has been given to the key elements of information, namely data and context. This paper outlines the importance of data in contributing to information superiority and highlights the lack of data centric approach in attaining information superiority. The paper also discusses the importance of verification and back tracking of information to ascertain the data, its source and context in validating information for its correctness, validity and accuracy. A brief list of consequences of information leaks is also provided in the document to emphasize the importance of information security in the context of data collected. Further, this paper examines the McCumber model, which outlines the various states and elements of information, to accommodate a data centric, quantitative approach. Outlining simple protocols for verification of data in the information superiority context, this paper also highlights a few steps that can be taken to verify the sources of data.